Hackers use LinkedIn to target UK nuclear waste firm

ITPRO, By Emma Woollacott, 2 Jan 24
Radioactive Waste Management said attackers have leveraged LinkedIn in a spear phishing campaign
Radioactive Waste Management (RWM), which is planning a huge underground nuclear waste store in the north of England, has been targeted by cyber criminals via LinkedIn, according to The Guardian.
Accounts for RWM filed at Companies House show that the organization has been targeted by cyber criminals using various methods, including the use of popular social network platforms to dupe staff.
RWM, which is part of Nuclear Waste Services (NWS), revealed that attacks have escalated in recent months, raising concerns over the risk of hackers gaining access to highly sensitive materials.
NWS chief executive, Corhyn Parr, said the government-backed organization has experienced “instances of potential exploitation of ownership change through specific attack vectors, predominantly LinkedIn targeting”…………………………………………………………………………..
The incident highlights a growing problem. Last month, for example, the UK’s National Cyber Security Centre (NCSC) and international partners warned that Russia-based hacking group Star Blizzard was using spear phishing techniques via email and social media to target defense and governmental organizations.
LinkedIn has been the method of choice in previous attacks on industry and infrastructure, according to Adam Pilton, cyber security consultant at CyberSmart.
Used by millions of professionals globally, the popular social network has become a key hunting ground for targets in recent years……………………………………………. more https://www.itpro.com/security/hackers-use-linkedin-to-target-uk-nuclear-waste-firm
1 Comment »
Leave a comment
-
Archives
- December 2025 (286)
- November 2025 (359)
- October 2025 (377)
- September 2025 (258)
- August 2025 (319)
- July 2025 (230)
- June 2025 (348)
- May 2025 (261)
- April 2025 (305)
- March 2025 (319)
- February 2025 (234)
- January 2025 (250)
-
Categories
- 1
- 1 NUCLEAR ISSUES
- business and costs
- climate change
- culture and arts
- ENERGY
- environment
- health
- history
- indigenous issues
- Legal
- marketing of nuclear
- media
- opposition to nuclear
- PERSONAL STORIES
- politics
- politics international
- Religion and ethics
- safety
- secrets,lies and civil liberties
- spinbuster
- technology
- Uranium
- wastes
- weapons and war
- Women
- 2 WORLD
- ACTION
- AFRICA
- Atrocities
- AUSTRALIA
- Christina's notes
- Christina's themes
- culture and arts
- Events
- Fuk 2022
- Fuk 2023
- Fukushima 2017
- Fukushima 2018
- fukushima 2019
- Fukushima 2020
- Fukushima 2021
- general
- global warming
- Humour (God we need it)
- Nuclear
- RARE EARTHS
- Reference
- resources – print
- Resources -audiovicual
- Weekly Newsletter
- World
- World Nuclear
- YouTube
-
RSS
Entries RSS
Comments RSS


But the corporations, financial institutions, government, law enforcement & these companies do absolutely nothing to track & prosecute these cyber criminals down. Has anybody seen a trial, an indictment or a “perp walk” of any of these cyber crooks? All they do when you report an attempt or become a victim of their hacks, is to send you an automatic: “DO NOT RESPOND” message & delete the message or report of an attempt or successful phishing attack. Case closed, out of sight, out of mind. Just the cost of doing business. & Yet the attacks keep happening & escalating.